Integer Overflow or Wraparound Affecting libtiff-devel package, versions <0:3.9.4-6.el6_3
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
4.34% (93rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-LIBTIFFDEVEL-2060224
- published 26 Jul 2021
- disclosed 15 Jun 2012
How to fix?
Upgrade Centos:6
libtiff-devel
to version 0:3.9.4-6.el6_3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff-devel
package and not the libtiff-devel
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
References
- http://www.securityfocus.com/bid/54076
- http://www.remotesensing.org/libtiff/v4.0.2.html
- https://access.redhat.com/security/cve/CVE-2012-2113
- http://www.debian.org/security/2012/dsa-2552
- http://security.gentoo.org/glsa/glsa-201209-02.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:101
- https://bugzilla.redhat.com/show_bug.cgi?id=810551
- http://rhn.redhat.com/errata/RHSA-2012-1054.html
- https://access.redhat.com/errata/RHSA-2012:1054
- http://secunia.com/advisories/49493
- http://secunia.com/advisories/49686
- http://secunia.com/advisories/50726
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html
- https://hermes.opensuse.org/messages/15083566